Penetration Testing
Jeremy Pickett Jeremy Pickett

Penetration Testing

Periodically assess your security posture by conducting penetration tests. Engage experienced security professionals to simulate real-world attacks and identify vulnerabilities in your systems, networks, and applications. Use the findings to remediate weaknesses and strengthen your defenses.

Read More
Incident Response Management
Jeremy Pickett Jeremy Pickett

Incident Response Management

Develop a comprehensive incident response plan that defines roles, responsibilities, and procedures for responding to security incidents. Regularly test and update your incident response plan to ensure its effectiveness. Conduct incident response drills to train your team and identify areas for improvement.

Read More
Application Software Security
Jeremy Pickett Jeremy Pickett

Application Software Security

Secure the software you develop and use. Adhere to secure coding practices to minimize vulnerabilities in your applications. Conduct regular security testing, including static code analysis, dynamic analysis, and penetration testing. Establish patch management processes to address identified vulnerabilities promptly.

Read More
Service Provider Management
Jeremy Pickett Jeremy Pickett

Service Provider Management

Carefully evaluate the security practices of your service providers. Include security requirements in contracts and service level agreements (SLAs). Regularly assess the security risks associated with third-party vendors and monitor their compliance with security standards. Implement incident response procedures to address security breaches involving service providers.

Read More
Security Awareness and Skills Training
Jeremy Pickett Jeremy Pickett

Security Awareness and Skills Training

Educate your employees about cybersecurity threats and best practices. Conduct regular security awareness training sessions covering topics like phishing, social engineering, and password hygiene. Provide employees with the knowledge and skills to recognize and report suspicious activity. Encourage a culture of security awareness throughout your organization.

Read More
Network Infrastructure Management
Jeremy Pickett Jeremy Pickett

Network Infrastructure Management

Harden your network infrastructure by implementing firewalls, intrusion detection systems (IDS), and network segmentation. Regularly review and update firewall rules and IDS signatures. Monitor network traffic for anomalies and unauthorized access attempts. Implement change management processes to control and track modifications to network configurations.

Read More
Data Recovery
Jeremy Pickett Jeremy Pickett

Data Recovery

Ensure you can recover from data loss or system failures. Implement regular backups of critical data, including system configurations and application data. Store backups securely, ideally in an offsite or offline location. Test your recovery procedures regularly to ensure you can restore data in a timely manner when needed.

Read More
—Malware Defenses
Jeremy Pickett Jeremy Pickett

—Malware Defenses

Deploy a layered defense strategy against malware. Use antivirus and anti-malware software on endpoints, implement intrusion prevention systems (IPS) at the network perimeter, and consider advanced threat protection solutions like sandboxing or endpoint detection and response (EDR). Keep your malware signatures and threat intelligence up-to-date to defend against the latest threats.

Read More
—Audit Log Management
Jeremy Pickett Jeremy Pickett

—Audit Log Management

Collect and retain comprehensive audit logs from your systems, networks, and applications. Use security information and event management (SIEM) tools to aggregate and correlate log data, enabling you to detect anomalies and potential security incidents. Establish clear log retention policies to comply with regulations and support forensic investigations.

Read More
Email and Web Browser Protections
Jeremy Pickett Jeremy Pickett

Email and Web Browser Protections

Safeguard your users from email-based and web-based threats. Implement spam filters, email authentication protocols (DMARC, DKIM, SPF), and web content filtering to block phishing attacks, malware, and malicious websites. Educate employees about safe browsing practices and the dangers of clicking on suspicious links or opening unknown attachments.

Read More
Continuous Vulnerability Management
Jeremy Pickett Jeremy Pickett

Continuous Vulnerability Management

Establish a proactive approach to identify and remediate vulnerabilities in your systems. Utilize automated vulnerability scanning tools to identify known weaknesses. Prioritize patching based on risk and severity, and implement compensating controls where patches are not readily available. Monitor vendor advisories for newly discovered vulnerabilities and apply patches promptly.

Read More
Access Control Management
Jeremy Pickett Jeremy Pickett

Access Control Management

Implement granular access controls to ensure that users have only the permissions necessary to perform their job functions. Utilize role-based access control (RBAC) to manage permissions efficiently. Employ network segmentation to limit lateral movement within your network. Monitor access logs for unauthorized attempts and promptly investigate any suspicious activity.

Read More
Data Protection v2
Jeremy Pickett Jeremy Pickett

Data Protection v2

Safeguard sensitive data throughout its lifecycle, from creation to disposal. Classify data based on sensitivity levels and apply appropriate security controls, such as encryption, access controls, and data loss prevention (DLP) solutions. Establish robust data retention and disposal policies to ensure compliance with regulations and minimize the risk of unauthorized access. Regularly review and update your data protection measures to address evolving threats.

Read More
Inventory and Control of Software Assets v2
Jeremy Pickett Jeremy Pickett

Inventory and Control of Software Assets v2

Maintain a comprehensive inventory of authorized software, including operating systems and applications. Employ whitelisting or application control tools to restrict execution to approved software only. Regularly scan for unauthorized or unmanaged software and remove or remediate it promptly. Implement a patch management process to address known vulnerabilities in a timely manner. Monitor software usage and activity to detect suspicious behavior.

Read More
Asset Inventory and Control v2
Jeremy Pickett Jeremy Pickett

Asset Inventory and Control v2

Continuously track and manage all hardware, software, and data assets across your network, including cloud and remote environments. Utilize automated discovery tools to identify unauthorized devices and promptly address them. Implement robust asset tagging and lifecycle management processes to ensure complete visibility and control. Track configuration changes to detect anomalies and enforce security baselines. Regularly audit your asset inventory to ensure accuracy and identify any gaps in your security posture.

Read More
Secure Configuration of Enterprise Assets and Software v2
Jeremy Pickett Jeremy Pickett

Secure Configuration of Enterprise Assets and Software v2

Harden your systems by applying secure configuration baselines to operating systems, applications, and network devices. Disable unnecessary services and protocols, close unused ports, and enforce strong passwords. Utilize configuration management tools to automate and standardize secure configurations across your environment. Regularly audit configurations for deviations from established baselines and promptly remediate any discrepancies.

Read More
Account Management v2
Jeremy Pickett Jeremy Pickett

Account Management v2

Establish strict controls over user accounts, including privileged accounts. Implement strong password policies, enforce multi-factor authentication (MFA), and adhere to the principle of least privilege. Regularly review and revoke access for inactive or terminated accounts. Monitor privileged account activity for suspicious behavior and implement alerting mechanisms for potential misuse.

Read More